A Novel Two-Level Protection Scheme against Hardware Trojans on a Reconfigurable CNN Accelerator

被引:0
|
作者
Liu, Zichu [1 ]
Hou, Jia [1 ]
Wang, Jianfei [1 ]
Yang, Chen [1 ]
机构
[1] Xi An Jiao Tong Univ, Sch Microelect, Xian 710049, Peoples R China
基金
中国国家自然科学基金;
关键词
reconfigurable CNN accelerator; hardware Trojans; security protection scheme;
D O I
10.3390/cryptography8030034
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the boom in artificial intelligence (AI), numerous reconfigurable convolution neural network (CNN) accelerators have emerged within both industry and academia, aiming to enhance AI computing capabilities. However, this rapid landscape has also witnessed a rise in hardware Trojan attacks targeted at CNN accelerators, thereby posing substantial threats to the reliability and security of these reconfigurable systems. Despite this escalating concern, there exists a scarcity of security protection schemes explicitly tailored to counteract hardware Trojans embedded in reconfigurable CNN accelerators, and those that do exist exhibit notable deficiencies. Addressing these gaps, this paper introduces a dedicated security scheme designed to mitigate the vulnerabilities associated with hardware Trojans implanted in reconfigurable CNN accelerators. The proposed security protection scheme operates at two distinct levels: the first level is geared towards preventing the triggering of the hardware Trojan, while the second level focuses on detecting the presence of a hardware Trojan post-triggering and subsequently neutralizing its potential harm. Through experimental evaluation, our results demonstrate that this two-level protection scheme is capable of mitigating at least 99.88% of the harm cause by three different types of hardware Trojan (i.e., Trojan within RI, MAC and ReLU) within reconfigurable CNN accelerators. Furthermore, this scheme can prevent hardware Trojans from triggering whose trigger signal is derived from a processing element (PE). Notably, the proposed scheme is implemented and validated on a Xilinx Zynq XC7Z100 platform.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Two-level dynamic programming hardware implementation for real time processing
    Kim, Yong
    Jeong, Hong
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2006, 4251 : 1090 - 1097
  • [42] Two-level hardware/software partitioning using CoDe-X
    Hartenstein, RW
    Becker, J
    Kress, R
    IEEE SYMPOSIUM AND WORKSHOP ON ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 1996, : 395 - 402
  • [43] Control of a two-level quantum system in a coherent feedback scheme
    Albertini, Francesca
    D'Alessandro, Domenico
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2013, 46 (04)
  • [44] A two-level matching scheme for speedy and accurate palmprint identification
    Li, Fang
    Leung, Maylor K. H.
    Yu, Xiaozhou
    ADVANCES IN MULTIMEDIA MODELING, PT 2, 2007, 4352 : 323 - +
  • [45] A two-level stabilization scheme for the Navier-Stokes equations
    Becker, R
    Braack, M
    NUMERICAL MATHEMATICS AND ADVANCED APPLICATIONS, PROCEEDINGS, 2004, : 123 - 130
  • [46] TWO-LEVEL ROLLBACK SCHEME AND ITS OPTIMAL IMPLEMENTATION.
    Kim, K.H.
    Proceedings of SOUTHEASTCON Region 3 Conference, 1981, : 447 - 454
  • [47] Two-Level Dictionary-Based Text Compression Scheme
    Zia, Md. Ziaul Karim
    Rahman, Dewan Md. Fayzur
    Rahman, Chowdhury Mofizur
    2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2, 2008, : 569 - 574
  • [48] A new two-level QR code with visual cryptography scheme
    Yuqiao Cheng
    Zhengxin Fu
    Bin Yu
    Gang Shen
    Multimedia Tools and Applications, 2018, 77 : 20629 - 20649
  • [49] Pixel detector readout electronics with two-level discriminator scheme
    Univ of California, Berkeley, United States
    IEEE Transactions on Nuclear Science, 1998, 45 (3 pt 1): : 745 - 750
  • [50] A two-level patching scheme for video-on-demand delivery
    Guan, DL
    Yu, SY
    IEEE TRANSACTIONS ON BROADCASTING, 2004, 50 (01) : 11 - 15